• Brucon 2012-Uncovering Sap Vulnerabilities:...

    http://www.securitytube.net/video/6897?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SecurityTube+28SecurityTube.Net%29
    文章 2013-02-17 807浏览量
  • Speed Matters:How To Process Big Data Securely For...

    Many businesses are pooling this information in vast“data lakes”,where data is stored in its natural state.However,uncovering salient information here is not an easy task.We need to better capture,...
    文章 2018-03-05 1151浏览量
  • 词嵌入」和「注意力」的新发现获得CoNLL 2018最佳论文...

    Uncovering Divergent Linguistic Information in Word Embeddings with Lessons for Intrinsic and Extrinsic Evaluation 从本征评价和外部评价的对比中学习,揭开词嵌入中包含的多样化语言信息 论文摘要:随着单词...
    文章 2018-11-01 358浏览量
  • 《软件工艺师:专业、务实、自豪》一2.4《敏捷软件...

    下面是从《敏捷软件开发宣言》网站中节选的一段话:We are uncovering better ways of developing software by doing it and helping others to do it.Through this work we have come to value:(我们在亲身实践及...
    文章 2017-06-22 915浏览量
  • 敏捷软件开发宣言及敏捷宣言遵循的原则

    We are uncovering better ways of developing software by doing it and helping others do it. Through this work we have come to value: Individuals and interactions over processes and tools Working ...
    文章 2012-11-10 1096浏览量
  • Agile 是什么?

    We are uncovering better ways of developing software by doing it and helping others do it. Through this work we have come to value: Individuals and interactions over processes and tools Working ...
    文章 2017-12-12 2349浏览量
  • 介绍十个安全工具

    brute-force and cryptanalysis attacks,recording VoIP conversations,decoding scrambled passwords,revealing password boxes,uncovering cached passwords and analyzing routing protocols 7:Backtrack 5 现在...
    文章 2017-11-12 1241浏览量
  • 34个获取设计灵感的好地方

    The Anatomy of Design:Uncovering the Influences and Inspirations in Modern Graphic Design 9件该做的事 参观一场艺术展 众所周知,设计师们治疗设计瓶颈的方法是投身一场美术展览中。现代艺术令我思想活跃,...
    文章 2017-11-23 1769浏览量
  • 深度:远控木马Posion Ivy开始肆虐缅甸和其它亚洲国家

    缅甸选举后的目标好像是跟随ASERT写的“Uncovering the Seven Pointed Dagger”文章中提到的模式。在这里看起来,攻击者开始使用STEP组织的文章,利用选举后的缅甸相关内容继续开展鱼叉攻击。这些样本使用的C2-...
    文章 2017-07-03 1744浏览量
  • Drupal CVE-2018-7600 漏洞利用和攻击

    背景介绍 2018年3月28日,Drupal Security Team官方发布了一个重要的安全公告,宣称Drupal 6,7,8等多个子版本存在远程代码执行漏洞,攻击者可以利用该...https://research.checkpoint.com/uncovering-drupalgeddon-2
    文章 2018-04-26 8317浏览量
  • Agile Development敏捷开发——培养敏捷精神

    We are uncovering better ways of developingsoftware by doing it and helping others do it.Through this work we have come to value: Individuals and interactions over processes and tools Working software...
    文章 2020-08-24 264浏览量
  • 《百年先驱——现代平面设计史中的50位巨匠》目录—...

    Heller,Steven,and Mirko Ilic.The Anatomy of Design:Uncovering the Influences and Inspirations in Modern Graphic Design.Beverly,MA:Rockport Publishers,2007. Heller,Steven;Ed.I Heart Design:Remarkable ...
    文章 2017-05-02 2858浏览量
  • linux pi_futex浅析

    Priority Inheritance,优先级继承,是解决优先级反转的一种办法。一个经典的例子:A/B/C三个实时进程,优先级A>B>C。C持有a锁,而A等待a锁被挂起。原本C释放a锁之后,A进程就可以继续执行的,但是偏偏有个比C...
    文章 2016-02-19 4772浏览量
  • Uncover Security Design Flaws Using The STRIDE ...

    This article discusses: The importance of threat modeling How to model a system using a data flow diagram How to mitigate threats This article uses the following technologies: STRIDE ...
    文章 2014-10-29 995浏览量
  • GitHub 3.6k Satr自监督学习(Self-Supervised ...

    自我监督学习已成为AI社区中令人兴奋的方向。Jitendra Malik:&34;Supervision is the opium of the AI researcher&34;Alyosha Efros:&34;The AI revolution will not be supervised&34;Yann LeCun:&34;...
    文章 2021-12-11 203浏览量
  • 独家|一文读懂社交网络分析-上(附学习资源)

    Palla,Gergely,et al."Uncovering the overlapping community structure of complex networks innature and society."arXiv preprint physics/0506133(2005). Kumpula,Jussi M.,et al."Sequential algorithm for ...
    文章 2017-10-10 4165浏览量
  • linux/fs/proc.txt(1)

    Uncovering various information about the kernel and the processes running on the system The proc file system acts as an interface to internal data structures in the kernel.It can be used to obtain ...
    文章 2017-10-31 1556浏览量
  • linux/fs/proc.txt

    In This Chapter-*Investigating the properties of the pseudo file system/proc and its ability to provide information on the running Linux system*Examining/proc's structure*Uncovering various ...
    文章 2012-07-24 1001浏览量
  • 带你读《计算机体系结构:量化研究方法(英文版·原书...

    2 Memory Hierarchy Design 2.1 Introduction Computer pioneers correctly predicted that programmers would want unlimited amounts of fast memory.An economical solution to that desire is a memory hierar-...
    文章 2019-11-12 1999浏览量
  • Paper:《Pre-Trained Models:Past,Present and ...

    目录Paper&xff1a;《Pre-Trained Models:Past,Present and Future大规模预训练模型的发展历史、最新现状和未来发展三个方向》翻译与解读Abstract1 Introduction简介2 Background背景2.1 Transfer Learning and ...
    文章 2022-07-24 13浏览量

云产品推荐

视频直播 大数据计算服务 MaxCompute 国内短信套餐包 ECS云服务器安全配置相关的云产品 开发者问答 阿里云建站 新零售智能客服 万网 小程序开发制作 视频内容分析 视频集锦 代理记账服务 阿里云AIoT 阿里云科技驱动中小企业数字化